O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART ICASING THE ESTABLISHMENT

Case Study: Is There Really Any SIP in the Internet?

Voice over IP (VoIP) and unified communications (UC) have many security issues—some unique and others shared with other network applications. Some security issues can be exploited from public networks, whereas others can only be exploited if the attacker has internal access. When we wrote the first version of this book, the majority of issues required internal access. UC is now more commonly used across the public network, and this network has become much more hostile. Part I of this book introduces the most significant UC threats and attacks, and then covers the processes of footprinting, scanning, and enumeration, which are used to gather information necessary ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required